mirror of
https://git.FreeBSD.org/ports.git
synced 2024-12-24 04:33:24 +00:00
2866a78221
It performs "black-box" scans, i.e. it does not study the source code of the application but will scans the webpages of the deployed webapp, looking for scripts and forms where it can inject data. Once it gets this list, Wapiti acts like a fuzzer, injecting payloads to see if a script is vulnerable. WWW: http://wapiti.sourceforge.net/ PR: ports/116873 Submitted by: Philippe Audeoud <jadawin at tuxaco.net>
37 lines
886 B
Makefile
37 lines
886 B
Makefile
# New ports collection makefile for: wapiti
|
|
# Date created: 3 October 2007
|
|
# Whom: Philippe Audeoud <jadawin@tuxaco.net>
|
|
# $FreeBSD$
|
|
|
|
PORTNAME= wapiti
|
|
PORTVERSION= 1.1.6
|
|
CATEGORIES= security
|
|
MASTER_SITES= ${MASTER_SITE_SOURCEFORGE_EXTENDED}
|
|
MASTER_SITE_SUBDIR= wapiti
|
|
|
|
MAINTAINER= jadawin@tuxaco.net
|
|
COMMENT= Wapiti is a vulnerability scanner for web applications
|
|
|
|
RUN_DEPENDS= ${PYTHON_SITELIBDIR}/tidy:${PORTSDIR}/www/py-utidy
|
|
|
|
USE_PYTHON= 2.3+
|
|
NO_BUILD= yes
|
|
PORTDOCS= README
|
|
|
|
PLIST_FILES= bin/wapiti.py \
|
|
bin/lswww.py \
|
|
bin/getcookie.py \
|
|
bin/cookie.py \
|
|
bin/BeautifulSoup.py
|
|
|
|
do-install:
|
|
.for i in wapiti.py lswww.py getcookie.py cookie.py BeautifulSoup.py
|
|
${INSTALL_SCRIPT} ${WRKSRC}/${i} ${PREFIX}/bin/
|
|
.endfor
|
|
.if !defined(NOPORTDOCS)
|
|
${MKDIR} ${DOCSDIR}
|
|
${INSTALL_DATA} ${WRKSRC}/README ${DOCSDIR}
|
|
.endif
|
|
|
|
.include <bsd.port.mk>
|